Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp1147201imm; Wed, 13 Jun 2018 14:15:37 -0700 (PDT) X-Google-Smtp-Source: ADUXVKK5uUComkksjMXgUEQo6lpAvHnIzkzSxpcvrJJlR2RIs8ELZK/VuP7mfS82SzC66d69tv0+ X-Received: by 2002:a17:902:23:: with SMTP id 32-v6mr6874543pla.252.1528924537164; Wed, 13 Jun 2018 14:15:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528924537; cv=none; d=google.com; s=arc-20160816; b=P+r29ZMz5fsB4XVSE5jxikyweEAjywbP89VfSK+v6MxnhE5pGj8CnY3IXrNY3HIOYT ffWlwusBWHf2dBSDoHqxDAK26g1WAEoVwo+Oh+sNCvCU56oh5VeRkMt7G66LL1SaIANw wB/5EzWHx8Rfw90T0iHJGxRE6LrFrdfUI5oiwl/hv68PltuSe/y+vOInV5lZg87R+3sl stRjLOXjnbAPWDew4Z3ytHlf8TcKfVjA8gXkY3iMwa6MWwm7UnM2RsOM0gFGj/XTlS4x P///hpO9Nz5nM+7CiJzVvquMc/zlGcr9iR+pvChBzDPWMKEQjEu4U0K4TFoqHdQu9Bhu ce0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=Ppx/Oh5cKvQIb+4lmB1ZytFj6f2gZI6hRhO4bNQo2u0=; b=OF3fhqBOmfE5XsNh5wQilR3KIyIfWrHhPZvkvqwNSm7g0pcm95puD8hxaAefs8kAvI Y3RLj7Y40uZo24xuX9KUgvAbVTE03/kHMYNAaqGPiCYC+ALtd7vjVe1ROw5SxcGu+NYa 4fmhWYv6N8tfMBFyeJucnS009ZZDwCVhGR3Gxd2K1f3UN4TonaUqKFOWXNYaibBXDFim 3mVeT/RLhzY5xaYnmuDR/CiaVNZJJanl0P7a1fUVYjKT6GH/90kC+JtMrR3JpgCi0oem 0zsG0OBpCrirymvdPUaBnfzl7e5IzIB3ke+kBqh1fif3tkWxW2uRfcfj0HqD8GgaZog3 t2uQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@yahoo.com header.s=s2048 header.b=tp9diYY3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q8-v6si3160335pgf.40.2018.06.13.14.15.22; Wed, 13 Jun 2018 14:15:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@yahoo.com header.s=s2048 header.b=tp9diYY3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754570AbeFMVO5 (ORCPT + 99 others); Wed, 13 Jun 2018 17:14:57 -0400 Received: from sonic313-20.consmr.mail.bf2.yahoo.com ([74.6.133.194]:33366 "EHLO sonic313-20.consmr.mail.bf2.yahoo.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754528AbeFMVOy (ORCPT ); Wed, 13 Jun 2018 17:14:54 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1528924493; bh=Ppx/Oh5cKvQIb+4lmB1ZytFj6f2gZI6hRhO4bNQo2u0=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From:Subject; b=tp9diYY3zbXbbFcFgip1G+e8Dx2XWCArkjmM3OHu+EiK2vaf1zMxbmPpawQljqYMH67SuyBZRo9t5DHhaNBQdJZIqTPKLEYtCqd4Ty7TpTxwFUAeWxE/TzT8AVSBP0j1OKD+i0CBuW9B+dljq0LnGoyaQwAmglBPRCJ3i717UkP4PZyb2ToTCcvQ7qeGouB2jrDrYjOAllIri7qI3p7bCuCHiqn6zdiQL5GubSEmfRA4I5lzlWJNm+xjgV4ajjAJLTs8KN5IeE5A95tlWN3X4iGJKAZtaCnLj4g7bKpeX7SNlHIgJ2jb63F7gukXXAFNFK23WXEMiD6VAv8i1W9gJA== X-YMail-OSG: IivEgQEVM1kJZSd.5PiOIYzpTMXsvAWqkICjNjn2NMU4uk6Z5BL5kB31qu3Zwo5 zLVC6tfEnsTp0M3e0A2wbs4Rf0wdzII4z85TFAloypFRWnz904D0KDX0oGN9fU55iN_V9pYAz5hY _4XtlMnU_4.gVD26VTsSTECMZKFiOyU2r76vWKiy2CPonv.nIQ80spfKUKmLnkQP8KJie43AH_qs .5iJPBLE52RhPCmf8uArWL.AUr.njdLqVaC4F5coiDl8tw8pm2Ss8ympl3WO.MzwKvTRR4RBqpld ZeIhzmlFM4rqZVv2xhqwjECFdJ4gtr0khRhRPwnMdPANGasYfwiNh5iSAQTPUqfg90HPC1Wn68aX .2dokZny7EJ4AbPqOuziEUSmvA6iKhYASa8j0CsouA.0xGyqWwXt3VyWuuEBLP6s8IkffEYVMnyY _1wg9LnnnLHLRmv8ncCvXNfinYdKdHvAJLEC6qX02X_5DIo49qzWnotiPoEYnCLrhbLOjW3jtqlX 2UKayMvjx5cVQqcW4ANz55yMJjSV2vJtC1jm0N76g.37s0Jc0Ewr.Hvjr8oFWD.BUvifd2PhPuKh _up4TT5Ob6tsTqaP2y8nVXzo9feLeOSOeAMDUu1ua5aoxo8RDqULwZQVyPPo0Zqxl0AwfoZ0CNfa Co2oRpQP5IBWICeElOfFsezpKO7QfOcVEAlIvoVtJzEZuNh4Kp4c54kd3DxA18KzJ5yjGJ_zYzuU zaESbbFgHPBpWl2hFrCZQ0xlW7Fw2a5f0LfSHettqQvA0gJ1cnL48IG4naWmY.8r1aL71wZqQdAw siTA8GHKX5OKNxYLY..F_qhS4m8Tt_y2HeteTePJ4SK2F689WJCPH4vQZ60N9rG981FDgQGnY.Fi XnMx3RGTId3xtju61AetUWqwn_TibFxakg7liX.Wkvrwh6SpQNZ8qMYiTeAtZF2kadR52Z_NvikW PWwR1HdJHgrNisCkvkDNimVF4RvC97e1dVw-- Received: from sonic.gate.mail.ne1.yahoo.com by sonic313.consmr.mail.bf2.yahoo.com with HTTP; Wed, 13 Jun 2018 21:14:53 +0000 Received: from c-67-169-65-224.hsd1.ca.comcast.net (EHLO [192.168.0.105]) ([67.169.65.224]) by smtp411.mail.bf1.yahoo.com (Oath Hermes SMTP Server) with ESMTPA ID 19c257903c3d9455624194e7d677b4f8; Wed, 13 Jun 2018 21:14:53 +0000 (UTC) Subject: Re: [-next PATCH] security: use octal not symbolic permissions To: Paul Moore , Joe Perches Cc: James Morris , John Johansen , Mimi Zohar , Dmitry Kasatkin , Stephen Smalley , Eric Paris , Kentaro Takeda , Tetsuo Handa , "Serge E. Hallyn" , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org, selinux@tycho.nsa.gov References: <1e91f8e10ce76d3208239b6b5899aab76d1543ff.1528743633.git.joe@perches.com> <3d890108a942b6a3fb9a5326501174af270707dc.camel@perches.com> <00961ef3fb41930a3304da935f1f73ebe386e83c.camel@perches.com> <38670733fba157f7acd9c1555b44a296420f0774.camel@perches.com> From: Casey Schaufler Message-ID: <1adae238-44cc-83f5-538a-1b9c12916875@schaufler-ca.com> Date: Wed, 13 Jun 2018 14:14:44 -0700 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 6/13/2018 12:57 PM, Paul Moore wrote: > On Wed, Jun 13, 2018 at 3:30 PM, Joe Perches wrote: >> On Wed, 2018-06-13 at 12:19 -0400, Paul Moore wrote: >>> On Wed, Jun 13, 2018 at 12:04 PM, Joe Perches wrote: >>>> On Wed, 2018-06-13 at 11:49 -0400, Paul Moore wrote: >>>>> On Tue, Jun 12, 2018 at 8:29 PM, Joe Perches wrote: >>>>>> On Tue, 2018-06-12 at 17:12 -0400, Paul Moore wrote: >>>>>>> Joe, in general I really appreciate the fixes you send, but these >>>>>>> patches that cross a lot of subsystem boundaries (this isn't the first >>>>>>> one that does this) causes unnecessary conflicts in -next and during >>>>>>> the merge window. Could you split your patches up from now on please? >>>>>> Sorry. No. Merge conflicts are inherent in this system. >>>>> Yes, merge conflicts are inherent in this system when one makes a >>>>> single change which impacts multiple subsystems, e.g. changing a core >>>>> kernel function which is called by multiple subsystems. However, that >>>>> isn't what this patch does, it makes a number of self-contained >>>>> changes across multiple subsystems; there are no cross-subsystem >>>>> dependencies in this patch. You are increasing the likelihood of >>>>> conflicts for no good reason; that is why I'm asking you to split this >>>>> patch and others like it. >>>> No. History shows with high certainty that splitting >>>> patches like this across multiple subsystems of a primary >>>> subsystem means that the entire patchset is not completely >>>> applied. >>> I think that is due more to a lack of effort on the part of the patch >>> author to keep pushing the individual patches. >> Nope. Try again. >> >> Resistance to change and desire for status quo >> occurs in many subsystems. > Which gets back to the need for persistence on the part of the patch > author. If your solution to a stubborn susbsystem is to go around > them by convincing another, potentially unrelated subsystem, to merge > the patch then I firmly believe you are doing it wrong. > >>>> It's _much_ simpler and provides a generic mechanism to >>>> get the entire patch applied to send a single patch to the >>>> top level subsystem maintainer. >>> I understand it is simpler for you, but it is more difficult for everyone else. >> Not true. > I think we are at the agree to disagree stage. > > The way you have structured this patch it makes it easier for you to > submit, but makes it potentially more difficult for me (likely other > LSM maintainers too), the -next folks, and Linus. I am agreeing with Paul. There is no reason that I/he should be compelled to accept the Smack/SELinux patches because he/I accepted the SELinux/Smack bits. > >> It's simply a matter of merge resolution being pushed down >> where and when necessary. >> >> See changes like the additions of the SPDX license tags. > Please don't even try to suggest that this trivial patch you are > proposing is even remotely as significant as the SPDX change. There > are always going to be exceptions to every rule, and with each > exception there needs to be a solid reason behind the change. The > SPDX change had a legitimate reason (legal concern) for doing it the > way it was done; this patch isn't close to that level of concern. > >>> Further, where the LSMs are concerned, there is no "top level >>> subsystem maintainer" anymore. SELinux and AppArmor send pull >>> requests directly to Linus. >> MAINTAINERS-SECURITY SUBSYSTEM >> MAINTAINERS-M: James Morris >> MAINTAINERS-M: "Serge E. Hallyn" >> MAINTAINERS-L: linux-security-module@vger.kernel.org (suggested Cc:) >> MAINTAINERS-T: git git://git.kernel.org/pub/scm/linux/kernel/git/jmorris/linux-security.git >> MAINTAINERS-W: http://kernsec.org/ >> MAINTAINERS-S: Supported >> MAINTAINERS:F: security/ >> MAINTAINERS- >> >> If James is not approving or merging security/selinux or >> security/tomoyo then perhaps the F: entries could be >> augmented with appropriate X: entries or made specific >> by using specific entries like: >> >> F: security/* >> F: security/integrity/ >> F: security/keys/ There are already F: entries for security/selinux, security/smack and security/apparmor so I don't get your point. > That is a good point. I'll put together a patch for selinux/next as > soon as the merge window closes. I'll let the other LSMs do as they > see fit. As I said previously, I believe the only other LSM that > sends directly to Linux is AppArmor. Smack will continue using the security subsystem so long as James offers the service. There's overhead in setting up the environment for sending directly to Linus that I'm in no rush to incur.